Digital Risks in Emerging Economies: Cyber Threat Escalation in Indonesia (2020–2023)

Authors

  • Rinaldo Sekolah Tinggi Manajemen Ilmu Komputer Mercusuar
  • Devi Puspitasari Institut Bisnis dan Informatika (IBI) Kosgoro 1957

DOI:

https://doi.org/10.61978/data.v2i3.697

Keywords:

Cybersecurity, Indonesia, Digital Transformation, Cyber Threats, Policy Response, SME Vulnerability, Investment Strategy

Abstract

Indonesia's rapid digital transformation over the past decade has brought with it a surge in cyber threats, posing significant risks to national security, economic resilience, and public trust. This study investigates the escalation of cyber incidents between 2020 and 2023, analyzing their trends, regulatory responses, and systemic vulnerabilities. Utilizing secondary data from national agencies and international platforms, the research employs both quantitative and qualitative methods to assess incident volumes and policy effectiveness. The results reveal a sharp rise in cyber incidents, from 88 million in 2020 to over 1.65 billion in 2021, driven largely by phishing, ransomware, and malware campaigns. Although regulatory frameworks such as BSSN Regulation No. 8/2020 and Presidential Regulations 82/2022 and 47/2023 represent important steps, enforcement remains weak, and sectoral coordination is limited. Investment in cybersecurity is critically low, averaging only 0.02% of GDP, while SMEs remain particularly vulnerable due to limited resources and awareness. Discussion of these findings highlights systemic barriers such as institutional fragmentation, insufficient technical capacity, and underdeveloped cybersecurity culture. The study emphasizes the importance of inter-agency collaboration, adaptive regulatory frameworks, and increased investment to build national resilience. Comparative insights from global best practices suggest that integrating stakeholder feedback and promoting continuous learning can significantly enhance threat response and governance outcomes. In conclusion, Indonesia's cybersecurity landscape requires urgent strategic realignment. A well-funded, coordinated, and flexible national cybersecurity framework is essential to protect the nation's digital infrastructure and foster sustainable digital development

References

Beaman, C., Barkworth, A., Akande, T., Hakak, S., & Khan, M. (2021). Ransomware: recent advances, analysis, challenges and future research directions. Computers & Security, 111, 102490. https://doi.org/10.1016/j.cose.2021.102490 DOI: https://doi.org/10.1016/j.cose.2021.102490

Carías, J., Borges, M., Labaka, L., Arrizabalaga, S., & Hernantes, J. (2020). Systematic approach to cyber resilience operationalization in SMEs. IEEE Access, 8, 174200–174221. https://doi.org/10.1109/access.2020.3026063 DOI: https://doi.org/10.1109/ACCESS.2020.3026063

Çifci, H. (2022). Comparison of national-level cybersecurity and cyber power indices: a conceptual framework. https://doi.org/10.21203/rs.3.rs-2159915/v1 DOI: https://doi.org/10.21203/rs.3.rs-2159915/v1

Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: a systematic literature review. SA Journal of Information Management, 23(1). https://doi.org/10.4102/sajim.v23i1.1277 DOI: https://doi.org/10.4102/sajim.v23i1.1277

Chimezie, O., Akagha, O., Dawodu, S., Anyanwu, A., Onwusinkwue, S., & Ahmad, I. (2024). Comprehensive review on cybersecurity: modern threats and advanced defense strategies. Computer Science & IT Research Journal, 5(2), 293–310. https://doi.org/10.51594/csitrj.v5i2.758 DOI: https://doi.org/10.51594/csitrj.v5i2.758

Cross, C., & Holt, T. (2021). Responding to cybercrime: results of a comparison between community members and police personnel. https://doi.org/10.52922/ti78207 DOI: https://doi.org/10.52922/ti78207

Dedeke, A., & Masterson, K. (2019). Contrasting cybersecurity implementation frameworks (CIF) from three countries. Information and Computer Security, 27(3), 373–392. https://doi.org/10.1108/ics-10-2018-0122 DOI: https://doi.org/10.1108/ICS-10-2018-0122

Drew, J. (2020). A study of cybercrime victimisation and prevention: exploring the use of online crime prevention behaviours and strategies. Journal of Criminological Research Policy and Practice, 6(1), 17–33. https://doi.org/10.1108/jcrpp-12-2019-0070 DOI: https://doi.org/10.1108/JCRPP-12-2019-0070

Drew, J., & Farrell, L. (2018). Online victimization risk and self-protective strategies: developing police-led cyber fraud prevention programs. Police Practice and Research, 19(6), 537–549. https://doi.org/10.1080/15614263.2018.1507890 DOI: https://doi.org/10.1080/15614263.2018.1507890

Familoni, B., & Shoetan, P. (2024). Cybersecurity in the financial sector: a comparative analysis of the USA and Nigeria. Computer Science & IT Research Journal, 5(4), 850–877. https://doi.org/10.51594/csitrj.v5i4.1046 DOI: https://doi.org/10.51594/csitrj.v5i4.1046

Fissel, E., & Lee, J. (2023). The cybercrime illusion: examining the impact of cybercrime misbeliefs on perceptions of cybercrime seriousness. Journal of Criminology, 56(2–3), 150–169. https://doi.org/10.1177/26338076231174639 DOI: https://doi.org/10.1177/26338076231174639

García-Pérez, A., Sallos, M., & Tiwasing, P. (2021). Dimensions of cybersecurity performance and crisis response in critical infrastructure organisations: an intellectual capital perspective. Journal of Intellectual Capital, 24(2), 465–486. https://doi.org/10.1108/jic-06-2021-0166 DOI: https://doi.org/10.1108/JIC-06-2021-0166

Gordon, L., Loeb, M., Lucyshyn, W., & Zhou, L. (2018). Empirical evidence on the determinants of cybersecurity investments in private sector firms. Journal of Information Security, 9(2), 133–153. https://doi.org/10.4236/jis.2018.92010 DOI: https://doi.org/10.4236/jis.2018.92010

Hadlington, L., & Chivers, S. (2018). Segmentation analysis of susceptibility to cybercrime: exploring individual differences in information security awareness and personality factors. Policing: A Journal of Policy and Practice, 14(2), 479–492. https://doi.org/10.1093/police/pay027 DOI: https://doi.org/10.1093/police/pay027

Holt, T., & Lee, J. (2019). Policing cybercrime through law enforcement and industry mechanisms., 644–662. https://doi.org/10.1093/oxfordhb/9780198812746.013.34 DOI: https://doi.org/10.1093/oxfordhb/9780198812746.013.34

Irwandy, I., Mangilep, A., Anggraeni, R., Noor, N., Niartiningsih, A., & Latifah, N. (2024). Cybersecurity culture among healthcare workers in Indonesia: knowledge gaps, demographic influences, and strategic policy solutions. https://doi.org/10.21203/rs.3.rs-5421169/v1 DOI: https://doi.org/10.21203/rs.3.rs-5421169/v1

Ispahany, J., Islam, R., Islam, M., & Khan, M. (2024). Ransomware detection using machine learning: a review, research limitations and future directions. IEEE Access, 12, 68785–68813. https://doi.org/10.1109/access.2024.3397921 DOI: https://doi.org/10.1109/ACCESS.2024.3397921

Jaman, U., Lubis, A., & Suhartono, S. (2023). Legal challenges in the development of information and communication technology SMEs in Jabodetabek region, Indonesia. West Science Law and Human Rights, 1(04), 149–156. https://doi.org/10.58812/wslhr.v1i04.321 DOI: https://doi.org/10.58812/wslhr.v1i04.321

Kamal, A., Yen, C., Ping, M., & Zahra, F. (2020). Cybersecurity issues and challenges during COVID-19 pandemic. https://doi.org/10.20944/preprints202009.0249.v1 DOI: https://doi.org/10.20944/preprints202009.0249.v1

Kaur, M., & Saini, M. (2022). Indian government initiatives on cyberbullying: a case study on cyberbullying in Indian higher education institutions. Education and Information Technologies, 28(1), 581–615. https://doi.org/10.1007/s10639-022-11168-4 DOI: https://doi.org/10.1007/s10639-022-11168-4

Khan, S., Saleh, T., Dorasamy, M., Khan, N., Leng, O., & Vergara, R. (2022). A systematic literature review on cybercrime legislation. F1000Research, 11, 971. https://doi.org/10.12688/f1000research.123098.1 DOI: https://doi.org/10.12688/f1000research.123098.1

Krishna, B., & M.P., S. (2021). Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysis. Information and Computer Security, 29(5), 737–760. https://doi.org/10.1108/ics-12-2020-0205 DOI: https://doi.org/10.1108/ICS-12-2020-0205

Lee, J., Holt, T., Burruss, G., & Bossler, A. (2019). Examining English and Welsh detectives’ views of online crime. International Criminal Justice Review, 31(1), 20–39. https://doi.org/10.1177/1057567719846224 DOI: https://doi.org/10.1177/1057567719846224

Malik, M., & Islam, U. (2019). Cybercrime: an emerging threat to the banking sector of Pakistan. Journal of Financial Crime, 26(1), 50–60. https://doi.org/10.1108/jfc-11-2017-0118 DOI: https://doi.org/10.1108/JFC-11-2017-0118

Manzoor, J., Waleed, A., Jamali, A., & Masood, A. (2024). Cybersecurity on a budget: evaluating security and performance of open-source SIEM solutions for SMEs. PLOS ONE, 19(3), e0301183. https://doi.org/10.1371/journal.pone.0301183 DOI: https://doi.org/10.1371/journal.pone.0301183

Maphosa, V. (2024). An overview of cybersecurity in Zimbabwe’s financial services sector. F1000Research, 12, 1251. https://doi.org/10.12688/f1000research.132823.2 DOI: https://doi.org/10.12688/f1000research.132823.2

Mupila, F., Gupta, H., & Bhardwaj, A. (2023). An empirical study on cyber crimes and cybersecurity awareness. https://doi.org/10.21203/rs.3.rs-3037289/v1 DOI: https://doi.org/10.21203/rs.3.rs-3037289/v1

Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321. https://doi.org/10.1080/0960085x.2020.1771222 DOI: https://doi.org/10.1080/0960085X.2020.1771222

Neuhaus, S., & Plattner, B. (2013). Software security economics: theory, in practice., 75–92. https://doi.org/10.1007/978-3-642-39498-0_4 DOI: https://doi.org/10.1007/978-3-642-39498-0_4

Neyole, J., Okwiri, S., & Mapema, N. (2024). Exploring the impact of cybersecurity threats on small and medium enterprises' performance: a case study of Kajiado County, Kenya. https://doi.org/10.20944/preprints202411.0237.v1 DOI: https://doi.org/10.20944/preprints202411.0237.v1

Neri, M., Niccolini, F., & Martino, L. (2023). Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment. Information and Computer Security, 32(1), 38–52. https://doi.org/10.1108/ics-05-2023-0084 DOI: https://doi.org/10.1108/ICS-05-2023-0084

Neri, M., Niccolini, F., & Pugliese, R. (2022). Assessing SMEs’ cybersecurity organizational readiness: findings from an Italian survey. Online Journal of Applied Knowledge Management, 10(2), 1–22. https://doi.org/10.36965/ojakm.2022.10(2)1-22 DOI: https://doi.org/10.36965/OJAKM.2022.10(2)1-22

Ngo, F., Piquero, A., LaPrade, J., & Duong, B. (2020). Victimization in cyberspace: is it how long we spend online, what we do online, or what we post online? Criminal Justice Review, 45(4), 430–451. https://doi.org/10.1177/0734016820934175 DOI: https://doi.org/10.1177/0734016820934175

Odimarha, A., Ayodeji, S., & Abaku, E. (2024). Securing the digital supply chain: cybersecurity best practices for logistics and shipping companies. World Journal of Advanced Science and Technology, 5(1), 026–030. https://doi.org/10.53346/wjast.2024.5.1.0030 DOI: https://doi.org/10.53346/wjast.2024.5.1.0030

Ofoegbu, K., Osundare, O., Ike, C., Fakeyede, O., & Ige, A. (2024). Proactive cyber threat mitigation: integrating data-driven insights with user-centric security protocols. Computer Science & IT Research Journal, 5(8), 2083–2106. https://doi.org/10.51594/csitrj.v5i8.1493 DOI: https://doi.org/10.51594/csitrj.v5i8.1493

Ogunjimi, O., Afoloeunsho, A., & Olukomoro, O. (2018). Elicitation of SME requirements for cybersecurity solutions through adherence to recommendations. Advances in Multidisciplinary & Scientific Research Journal Publication, 6(2), 29–34. https://doi.org/10.22624/aims/maths/v6n2p4 DOI: https://doi.org/10.22624/AIMS/MATHS/V6N2P4

Özkan, B., & Spruit, M. (2020). Cybersecurity standardisation for SMEs., 1252–1278. https://doi.org/10.4018/978-1-7998-7705-9.ch056 DOI: https://doi.org/10.4018/978-1-7998-7705-9.ch056

Pekarčík, M., Šafár, L., Rutecka, P., & Morawiec, P. (2024). Unveiling the impact of ownership structure on SMEs’ cybersecurity perceptions. https://doi.org/10.21203/rs.3.rs-4526358/v1 DOI: https://doi.org/10.21203/rs.3.rs-4526358/v1

Pike, A., Adams, W., Huggins, R., Mazerolle, S., & Casa, D. (2019). Analysis of states' barriers to and progress toward implementation of health and safety policies for secondary school athletics. Journal of Athletic Training, 54(4), 361–373. https://doi.org/10.4085/1062-6050-28-18 DOI: https://doi.org/10.4085/1062-6050-28-18

Downloads

Published

2024-07-31

How to Cite

Rinaldo, & Puspitasari, D. (2024). Digital Risks in Emerging Economies: Cyber Threat Escalation in Indonesia (2020–2023). Data : Journal of Information Systems and Management, 2(3), 152–163. https://doi.org/10.61978/data.v2i3.697

Issue

Section

Articles